<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Keerthika K</title>
    <description>The latest articles on DEV Community by Keerthika K (@keerthika_kadhiresan).</description>
    <link>https://dev.to/keerthika_kadhiresan</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3352844%2F1461b713-7d04-4623-84de-494b99ee80f9.png</url>
      <title>DEV Community: Keerthika K</title>
      <link>https://dev.to/keerthika_kadhiresan</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/keerthika_kadhiresan"/>
    <language>en</language>
    <item>
      <title>Ever heard of Cryptographic Failure? 👀 Here’s why it’s chilling in the OWASP Top 10 😎</title>
      <dc:creator>Keerthika K</dc:creator>
      <pubDate>Sun, 07 Sep 2025 07:14:59 +0000</pubDate>
      <link>https://dev.to/keerthika_kadhiresan/ever-heard-of-cryptographic-failure-heres-why-its-chilling-in-the-owasp-top-10-4gib</link>
      <guid>https://dev.to/keerthika_kadhiresan/ever-heard-of-cryptographic-failure-heres-why-its-chilling-in-the-owasp-top-10-4gib</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/keerthika_kadhiresan/cryptographic-failure-worked-hard-to-sit-here-in-owasp-top-10--4kp0" class="crayons-story__hidden-navigation-link"&gt;Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/keerthika_kadhiresan" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3352844%2F1461b713-7d04-4623-84de-494b99ee80f9.png" alt="keerthika_kadhiresan profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/keerthika_kadhiresan" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Keerthika K
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Keerthika K
                
              
              &lt;div id="story-author-preview-content-2820292" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/keerthika_kadhiresan" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3352844%2F1461b713-7d04-4623-84de-494b99ee80f9.png" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Keerthika K&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/keerthika_kadhiresan/cryptographic-failure-worked-hard-to-sit-here-in-owasp-top-10--4kp0" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Sep 4 '25&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/keerthika_kadhiresan/cryptographic-failure-worked-hard-to-sit-here-in-owasp-top-10--4kp0" id="article-link-2820292"&gt;
          Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/cybersecurity"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;cybersecurity&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/programming"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;programming&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/beginners"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;beginners&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/infosec"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;infosec&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/keerthika_kadhiresan/cryptographic-failure-worked-hard-to-sit-here-in-owasp-top-10--4kp0" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/exploding-head-daceb38d627e6ae9b730f36a1e390fca556a4289d5a41abb2c35068ad3e2c4b5.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/multi-unicorn-b44d6f8c23cdd00964192bedc38af3e82463978aa611b4365bd33a0f1f4f3e97.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;5&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/keerthika_kadhiresan/cryptographic-failure-worked-hard-to-sit-here-in-owasp-top-10--4kp0#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            2 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
      <category>cybersecurity</category>
      <category>programming</category>
      <category>beginners</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Cryptographic Failure (Worked hard to sit here in OWASP Top 10 😎)</title>
      <dc:creator>Keerthika K</dc:creator>
      <pubDate>Thu, 04 Sep 2025 17:37:31 +0000</pubDate>
      <link>https://dev.to/keerthika_kadhiresan/cryptographic-failure-worked-hard-to-sit-here-in-owasp-top-10--4kp0</link>
      <guid>https://dev.to/keerthika_kadhiresan/cryptographic-failure-worked-hard-to-sit-here-in-owasp-top-10--4kp0</guid>
      <description>&lt;p&gt;&lt;strong&gt;Buzz word Cryptography means??&lt;/strong&gt; 🔮&lt;br&gt;
Converting data from a readable format to an unreadable format is called &lt;strong&gt;ciphertext&lt;/strong&gt;. We achieve this using various encryption algorithms. It acts like a lock so a hacker cannot see what’s inside your home (here, the message). And just like every lock needs a key, the same concept applies here — a &lt;strong&gt;cryptographic key is provided to decipher the message back&lt;/strong&gt; to its actual form.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;“The Cryptographic Failure” 🦸🏻‍♀️ means??&lt;/strong&gt;&lt;br&gt;
It can be caused by various things. Some common reasons are:&lt;br&gt;
🕐 Not handling cryptographic keys properly&lt;br&gt;
🕑 Using outdated encryption algorithms 😿&lt;br&gt;
🕒 Misconfiguration of encryption algorithms&lt;/p&gt;




&lt;p&gt;Okayy guys, does it &lt;strong&gt;cause risks&lt;/strong&gt;??&lt;br&gt;
Yes, of course bro 🚨&lt;br&gt;
• The brand reputation you built for years can be demolished in seconds (reputation damage)&lt;br&gt;
• Your sensitive data will go into hackers’ hands&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Real Example: The Heartbleed Bug&lt;/strong&gt; 💔&lt;br&gt;
This bug was found in an old OpenSSL cryptography library and occurred due to improper input validation. It was classified under a buffer-over-read vulnerability. It was fixed on April 7, 2014 🔐.&lt;br&gt;
This bug was identified by Neel Mehta, Riku, Antti, and Matti. Due to the flaw in the TLS heartbeat extension, it got its name as Heartbleed.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;How do hackers exploit cryptographic failures?&lt;/strong&gt;&lt;br&gt;
By:&lt;br&gt;
• &lt;em&gt;Intercepting&lt;/em&gt; your conversations (Man-in-the-Middle attack)&lt;br&gt;
• Trying various passwords (&lt;em&gt;brute-force attacks&lt;/em&gt;)&lt;br&gt;
• _Discovering weak or exposed keys _and using them&lt;br&gt;
So always follow standard security practices.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Time for superheroes to learn Prevention Techniques 🦸🏻&lt;/strong&gt;&lt;br&gt;
1️⃣ Update yourself and use &lt;em&gt;modern cryptographic standard algorithms&lt;/em&gt;&lt;br&gt;
2️⃣ &lt;em&gt;Manage your keys properly _— store them securely, and ensure they are unique every time&lt;br&gt;
3️⃣ Do _regular security testing (dynamic scenarios), audits&lt;/em&gt;, and fix problems early&lt;br&gt;
4️⃣ While transmitting, also use _secure protocols _(e.g., HTTPS)&lt;/p&gt;




&lt;p&gt;Finallyy ✨&lt;br&gt;
&lt;strong&gt;Security is not meant only for giants — it’s for everyone.&lt;/strong&gt;&lt;br&gt;
Become a superhero by securing your applications 🤗&lt;br&gt;
Thanks for reading! If you found this helpful, drop your thoughts in the comments (❁´◡`❁).&lt;br&gt;
🤔What cybersecurity topic should I cover next? 😅&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>programming</category>
      <category>beginners</category>
      <category>infosec</category>
    </item>
    <item>
      <title>🔐 Broken Access Control (BAC) – A Key OWASP Top 10 Vulnerability (2025 Edition 😎)</title>
      <dc:creator>Keerthika K</dc:creator>
      <pubDate>Tue, 02 Sep 2025 16:36:42 +0000</pubDate>
      <link>https://dev.to/keerthika_kadhiresan/broken-access-control-bac-a-key-owasp-top-10-vulnerability-2025-edition--4h17</link>
      <guid>https://dev.to/keerthika_kadhiresan/broken-access-control-bac-a-key-owasp-top-10-vulnerability-2025-edition--4h17</guid>
      <description>&lt;p&gt;&lt;strong&gt;What is Access Control in Cybersecurity?&lt;/strong&gt; 🤔&lt;br&gt;
Access control is a security mechanism that decides who can view, modify, or delete data.&lt;br&gt;
When access control is not properly configured (Broken Access Control), attackers exploit it to steal, modify, or delete sensitive user data. This makes BAC one of the most dangerous OWASP Top 10 vulnerabilities.&lt;/p&gt;




&lt;p&gt;⚠️ &lt;strong&gt;Types of Broken Access Control Vulnerabilities&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;strong&gt;Horizontal Privilege Escalation&lt;/strong&gt; 🚥
Example: Person A and Person B both have the same permission level (say, viewing only their bank info). But with BAC flaws, Person A can also view or change Person B’s bank details—a clear violation of data privacy.&lt;/li&gt;
&lt;li&gt; *&lt;em&gt;Vertical Privilege Escalation *&lt;/em&gt;🚦
A normal user (low-level) exploits BAC to gain admin-level access, leading to severe security breaches such as deleting accounts or modifying system data.&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Context-Dependent Privilege Escalation&lt;/strong&gt; 🎭 (aka the smart hacker move)
Example: A user adds items to their cart and checks out. With BAC issues, they can manipulate the payment amount.
Another case: performing actions in the wrong sequence (like skipping payment) also arises due to broken access control.&lt;/li&gt;
&lt;/ol&gt;




&lt;p&gt;😟 &lt;strong&gt;Why is Broken Access Control Dangerous?&lt;/strong&gt;&lt;br&gt;
• &lt;em&gt;Sensitive data exposure&lt;/em&gt; → Attackers can view, modify, or steal confidential information.&lt;br&gt;
• &lt;em&gt;Account takeover risks _→ Hackers can impersonate other users.&lt;br&gt;
• _DDoS attacks using stolen data&lt;/em&gt; → Fun fact: attackers may even weaponize your stolen data to launch Distributed Denial of Service (DDoS) attacks.&lt;/p&gt;




&lt;p&gt;🛡️ *&lt;em&gt;How to Prevent Broken Access Control *&lt;/em&gt;(Best Practices)&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;em&gt;Continuous Security Testing&lt;/em&gt; – Regularly identify &amp;amp; patch access control flaws.&lt;/li&gt;
&lt;li&gt; &lt;em&gt;CORS Protocol Usage&lt;/em&gt; – Configure Cross-Origin Resource Sharing (CORS) properly to prevent unauthorized requests.&lt;/li&gt;
&lt;li&gt; &lt;em&gt;RBAC (Role-Based Access Control)&lt;/em&gt; 🏃🏻‍➡️ – Assign permissions based on roles, reducing privilege misuse.&lt;/li&gt;
&lt;li&gt; _Permission-Based Access Control _🔛 – Ensure systems check if a user role has required permissions.&lt;/li&gt;
&lt;li&gt; &lt;em&gt;Mandatory Access Control (MAC)&lt;/em&gt; ⚔️ – Limit sensitive data access only to administrators, based on data classification &amp;amp; sensitivity.
________________________________________&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;✅ &lt;strong&gt;Conclusion&lt;/strong&gt;&lt;br&gt;
Broken Access Control is not just a theoretical risk—it’s a real-world cybersecurity threat recognized in the OWASP Top 10 (2025).&lt;br&gt;
By implementing strong access control mechanisms, organizations can:&lt;br&gt;
✔️ Protect sensitive data 💾&lt;br&gt;
✔️ Prevent privilege escalation 🚫&lt;br&gt;
✔️ Strengthen overall cybersecurity posture 🔐&lt;br&gt;
💪 Build strong access control. Stay worry-free 😮‍💨.&lt;/p&gt;




&lt;p&gt;👉 Thanks for reading! If you found this helpful, drop your thoughts in the comments (❁´◡`❁).&lt;br&gt;
🔥 What cybersecurity topic should I cover next? 😅&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>webdev</category>
      <category>beginners</category>
    </item>
    <item>
      <title>SQL Injection (Got a place in the OWASP Top 10) 🧑🏻‍💻</title>
      <dc:creator>Keerthika K</dc:creator>
      <pubDate>Thu, 21 Aug 2025 17:27:49 +0000</pubDate>
      <link>https://dev.to/keerthika_kadhiresan/sql-injection-got-a-place-in-the-owasp-top-10-38fc</link>
      <guid>https://dev.to/keerthika_kadhiresan/sql-injection-got-a-place-in-the-owasp-top-10-38fc</guid>
      <description>&lt;p&gt;&lt;strong&gt;SQL Injection&lt;/strong&gt; (Got a place in the OWASP Top 10) 🧑🏻‍💻&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Definition:&lt;/strong&gt;&lt;br&gt;
As the name says, the attacker injects malicious SQL code into the database through user input fields &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Are these harmful?&lt;/strong&gt;⚠️&lt;br&gt;
These queries can retrieve, modify, or delete data (data integrity issue), escalate privilege, and give unauthorized access to sensitive data. Sooo, leaving it to you to decide whether it’s harmful or not… 😏&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Occurs Due To…?&lt;/strong&gt; 🤔&lt;br&gt;
Mostly Developer! 👨‍💻👩‍💻 Yes, you heard that right. Whenever developers do not properly sanitize input and simply insert user input into the database, the bad guys (attackers) take advantage of it.&lt;br&gt;
&lt;strong&gt;Example:&lt;/strong&gt;&lt;br&gt;
select * from bank where user_id=1867 or 1=1&lt;br&gt;
Since 1=1 is always true , it bypasses normal authentication and the query is successfully executed.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Wanna know deeper..? Let’s explore the types of SQL injection&lt;/strong&gt; (mainly 5) 🔍&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt; &lt;strong&gt;In-band SQL Injection&lt;/strong&gt;
Same as above—here, the attacker uses the application interface and sends the query. As simple as that, but extremely common ⚡&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Out-of-band SQL Injection&lt;/strong&gt;
Rare but dangerous 😈 (evil laugh). Bad guys use different communication channels to steal data from the database.&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Error-based&lt;/strong&gt;
Learning from flaws 🪲 Yes, the attackers do this too. They learn about the DB structure/schema from error messages and use them for attacks.&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Blind SQL Injection&lt;/strong&gt;
Try, try, try... 🎯 Ahhh, the attackers follow this too. They observe the behavior of the application by using different boolean conditions and gather info about the DB.&lt;/li&gt;
&lt;li&gt; &lt;strong&gt;Time-based SQL Injection&lt;/strong&gt;
Delayed time ⏳—no worry, unless the query runs successfully. Attackers send a query with a time delay and, based on response time, can tell if their query worked or flopped.
&lt;strong&gt;Example:&lt;/strong&gt;
select * from user where id=265 and sleep(5);
________________________________________&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Prevention is Better than Cure&lt;/strong&gt; 🛡️ (Maintain hygienic practice in coding too 😭😭)&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;     ✅ Use &lt;em&gt;prepared statements &amp;amp; parameterized queries&lt;/em&gt;—these treat user input as ‘data’, not as part of the SQL query.&lt;/li&gt;
&lt;li&gt; 📦 &lt;em&gt;Stored Procedures&lt;/em&gt; can Avoid dynamic construction of SQL queries.&lt;/li&gt;
&lt;li&gt; 📝 &lt;em&gt;Whitelist&lt;/em&gt; input by validating before using them in queries.&lt;/li&gt;
&lt;li&gt; ⚙️ Use &lt;em&gt;ORM frameworks&lt;/em&gt; (Hibernate, Entity Framework), as these automatically handle query generation and can help block dynamic queries.&lt;/li&gt;
&lt;li&gt; 🔒 &lt;em&gt;Restrict privilege&lt;/em&gt; and  provide only required privilege for users—don’t allow DROP or ALTER permissions for everyone.&lt;/li&gt;
&lt;li&gt; 🐞_Handle errors wisely _by displaying only generic messages to the user.&lt;/li&gt;
&lt;li&gt; 🛠️ Use &lt;em&gt;automated tools&lt;/em&gt; like SQLMap, Burp Suite, OWASP ZAP for scanning vulnerabilities.&lt;/li&gt;
&lt;li&gt; 🕵️ Perform &lt;em&gt;regular penetration testing&lt;/em&gt; with a pen tester.&lt;/li&gt;
&lt;li&gt; 📚 Follow &lt;em&gt;secure coding practices _and educate everyone around you.
_&lt;/em&gt;______________________________________&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;So I am concluding by saying,✨&lt;br&gt;
“Stay aware, build wise, stay safe.” 💡&lt;br&gt;
Thank you for reading 🙂&lt;br&gt;
If you have any doubts, kindly drop them in the comment section 🤷&lt;br&gt;
What topic should I cover nexttt..? &lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>webdev</category>
      <category>database</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Think before you click .</title>
      <dc:creator>Keerthika K</dc:creator>
      <pubDate>Thu, 21 Aug 2025 17:17:58 +0000</pubDate>
      <link>https://dev.to/keerthika_kadhiresan/think-before-you-click--244j</link>
      <guid>https://dev.to/keerthika_kadhiresan/think-before-you-click--244j</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/keerthika_kadhiresan/-think-before-you-click-real-life-phishing-attacks-you-should-know-326d" class="crayons-story__hidden-navigation-link"&gt;🧠 Think Before You Click: Real-Life Phishing Attacks You Should Know 👀&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;

          &lt;a href="/keerthika_kadhiresan" class="crayons-avatar  crayons-avatar--l  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3352844%2F1461b713-7d04-4623-84de-494b99ee80f9.png" alt="keerthika_kadhiresan profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/keerthika_kadhiresan" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Keerthika K
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Keerthika K
                
              
              &lt;div id="story-author-preview-content-2685900" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/keerthika_kadhiresan" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3352844%2F1461b713-7d04-4623-84de-494b99ee80f9.png" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Keerthika K&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

          &lt;/div&gt;
          &lt;a href="https://dev.to/keerthika_kadhiresan/-think-before-you-click-real-life-phishing-attacks-you-should-know-326d" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Jul 14 '25&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/keerthika_kadhiresan/-think-before-you-click-real-life-phishing-attacks-you-should-know-326d" id="article-link-2685900"&gt;
          🧠 Think Before You Click: Real-Life Phishing Attacks You Should Know 👀
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/cybersecurity"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;cybersecurity&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/security"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;security&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/infosec"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;infosec&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/beginners"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;beginners&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/keerthika_kadhiresan/-think-before-you-click-real-life-phishing-attacks-you-should-know-326d" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/multi-unicorn-b44d6f8c23cdd00964192bedc38af3e82463978aa611b4365bd33a0f1f4f3e97.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/raised-hands-74b2099fd66a39f2d7eed9305ee0f4553df0eb7b4f11b01b6b1b499973048fe5.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;12&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/keerthika_kadhiresan/-think-before-you-click-real-life-phishing-attacks-you-should-know-326d#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              3&lt;span class="hidden s:inline"&gt; comments&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            2 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>infosec</category>
      <category>beginners</category>
    </item>
    <item>
      <title>🧠 Think Before You Click: Real-Life Phishing Attacks You Should Know 👀</title>
      <dc:creator>Keerthika K</dc:creator>
      <pubDate>Mon, 14 Jul 2025 07:55:07 +0000</pubDate>
      <link>https://dev.to/keerthika_kadhiresan/-think-before-you-click-real-life-phishing-attacks-you-should-know-326d</link>
      <guid>https://dev.to/keerthika_kadhiresan/-think-before-you-click-real-life-phishing-attacks-you-should-know-326d</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;Imagine one fine evening, you get a sudden message from your bank:&lt;br&gt;&lt;br&gt;
“Your account has been blocked. Click here to fix it.”&lt;br&gt;&lt;br&gt;
You're tensed. You panic. You click it.&lt;br&gt;&lt;br&gt;
BOOM. &lt;br&gt;
Hackers now have your credentials.&lt;/em&gt;&lt;br&gt;&lt;br&gt;
Haha… (evil laugh)&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Welcome to the world of phishing attacks — where hackers don’t break in, they trick you into opening the door.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  🧭 What is Phishing?
&lt;/h2&gt;

&lt;p&gt;Phishing is a cyber attack where the hacker &lt;strong&gt;pretends to be a trusted source&lt;/strong&gt; and sends you an urgent message, usually to create panic.&lt;br&gt;&lt;br&gt;
They trick you into clicking a link, filling out a form, or downloading something shady — and &lt;strong&gt;steal your info&lt;/strong&gt; (passwords, PINs, credit card details... you name it).&lt;/p&gt;

&lt;p&gt;These &lt;strong&gt;digital thieves&lt;/strong&gt; come disguised as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fake emails
&lt;/li&gt;
&lt;li&gt;Fake SMS
&lt;/li&gt;
&lt;li&gt;Even fake websites that look scarily real (UI 10/10, intentions 0/10 💀)&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🎭 Types of Phishing Attacks
&lt;/h2&gt;

&lt;p&gt;There are mainly &lt;strong&gt;6 types&lt;/strong&gt; — let’s break them down:&lt;/p&gt;

&lt;h3&gt;
  
  
  1️⃣ Email Phishing
&lt;/h3&gt;

&lt;p&gt;Mass emails with fake links, hoping someone clicks.  &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;But not you — you’re smart 😌&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  2️⃣ Spear Phishing
&lt;/h3&gt;

&lt;p&gt;Targeted attacks aimed at a specific person like a CEO, manager, or even you if you're vibing too high.&lt;/p&gt;

&lt;h3&gt;
  
  
  3️⃣ Smishing
&lt;/h3&gt;

&lt;p&gt;SMS-based phishing.  &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Your FASTag is blocked. Click to recharge.” No ,not falling for it.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  4️⃣ Vishing
&lt;/h3&gt;

&lt;p&gt;Voice-based phishing via &lt;strong&gt;phone calls&lt;/strong&gt;.  &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Hello Sir, I’m from your bank. Kindly share your OTP.”&lt;br&gt;&lt;br&gt;
Never. Ever. Do. That.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  5️⃣ Clone Phishing
&lt;/h3&gt;

&lt;p&gt;A legit email is copied and resent with &lt;strong&gt;malicious attachments&lt;/strong&gt;.  &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;E.g., Yesterday’s bank statement becomes today’s malware if you’re not careful.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  6️⃣ Whaling
&lt;/h3&gt;

&lt;p&gt;Big fish scam: Emails that look like they’re from your CEO or manager asking you to share login creds or perform urgent tasks.  &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;“Hey, can you share your password? Need it urgently.”&lt;/em&gt; — Bro, no.&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  🚩 How to Spot a Phishing Attempt
&lt;/h2&gt;

&lt;p&gt;Be on high alert when you see:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Urgency traps&lt;/strong&gt;: Words like &lt;em&gt;urgent&lt;/em&gt;, &lt;em&gt;alert&lt;/em&gt;, &lt;em&gt;EOD&lt;/em&gt;, &lt;em&gt;limited time&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Fishy sender emails&lt;/strong&gt;: &lt;code&gt;support@amaz0n.in&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Shortened links&lt;/strong&gt;: &lt;code&gt;bit.ly/paytmsecure&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Grammatical mistakes&lt;/strong&gt;: Spelling errors, weird formatting
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Requests for sensitive data&lt;/strong&gt;: OTP, PIN, login info, or card numbers&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🛡️ How to Protect Yourself (The Real Flex)
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;Pause. Breathe. Read before you click.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;✅ &lt;strong&gt;Don’t click&lt;/strong&gt; suspicious links — open apps or type the official URL&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Verify&lt;/strong&gt; with the sender/company before sending money or info&lt;br&gt;&lt;br&gt;
✅ Use &lt;strong&gt;2FA (Two-Factor Authentication)&lt;/strong&gt; on all accounts&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Keep your software updated&lt;/strong&gt; and use antivirus&lt;br&gt;&lt;br&gt;
✅ &lt;strong&gt;Report phishing&lt;/strong&gt; emails to CERT-IN or your email provider  &lt;/p&gt;




&lt;h3&gt;
  
  
  💌 Drop your thoughts, questions, or phishing stories below.
&lt;/h3&gt;

&lt;p&gt;Let’s create a community where hackers don’t stand a chance.&lt;br&gt;&lt;br&gt;
&lt;strong&gt;Thanks for reading! 🔐💻&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>infosec</category>
      <category>beginners</category>
    </item>
  </channel>
</rss>
